Monday, April 23, 2012

Weak passwords still subvert IT security

Computerworld Security: April 23, 2012
===============================================================

Weak passwords still subvert IT security

A recent breach that exposed the Social Security numbers of more than 280,000
people in Utah to hackers has once again highlighted the well-recognized, but
often discounted, risks posed to organizations by weak and default passwords.
http://cwonline.computerworld.com/t/7968131/823929835/560534/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Oracle~~~~~~~~~~~~~~~~~~~~~

Copying Sensitive Data Into Non-Production Environments

Download this paper to learn data masking best practices and enable your
organization to safely use production data for development, testing, and sharing
with out-source or off-shore partners, without risking a sensitive data breach.

http://cwonline.computerworld.com/t/7968131/823929835/560535/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Flashback botnet not shrinking, huge numbers of Macs still infected
http://cwonline.computerworld.com/t/7968131/823929835/560536/0/

2. Why Google should be allowed to 'harvest' your Wi-Fi data
http://cwonline.computerworld.com/t/7968131/823929835/560537/0/

3. Tech groups pushing for cyberthreat info-sharing bill
http://cwonline.computerworld.com/t/7968131/823929835/560538/0/

4. Proof-of-concept Android Trojan uses motion sensor to determine tapped keys
http://cwonline.computerworld.com/t/7968131/823929835/560539/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Brocade Communications~~~~~~~~~~~~~~~~~~~~~

Is Cloud the Answer to Federal IT Savings?

In this eGuide, Computerworld and its sister publications CIO and Network World
have collected interviews and articles that cover some of the biggest issues
faced by federal agency IT departments today. Read on to learn about the
technology challenges the U.S. government is facing, and how some agencies are
dealing with them.

http://cwonline.computerworld.com/t/7968131/823929835/560540/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Flashback botnet not shrinking, huge numbers of Macs still infected

Contrary to reports by several security companies, the Flashback botnet is not
shrinking, the Russian antivirus firm that first reported the massive infection
three weeks ago claimed today.
http://cwonline.computerworld.com/t/7968131/823929835/560536/0/

Why Google should be allowed to 'harvest' your Wi-Fi data

The FCC cleared Google of wrongdoing in the so-called 'WiSpy' case. It was the
right call, says columnist Mike Elgan, because Google did nothing wrong.
http://cwonline.computerworld.com/t/7968131/823929835/560537/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM~~~~~~~~~~~~~~~~~~~~~

Cutting Costs and Simplifying Management on IBM XIV

Read the white paper and see how this platform increased performance for
applications such as Microsoft Exchange and eliminated maintenance costs while
simplifying storage management.

http://cwonline.computerworld.com/t/7968131/823929835/560541/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Tech groups pushing for cyberthreat info-sharing bill

Several technology trade groups are pushing the U.S. Congress to pass a
controversial cyberthreat information-sharing bill, despite ongoing privacy
concerns voiced by digital rights and civil liberties groups.
http://cwonline.computerworld.com/t/7968131/823929835/560538/0/

Proof-of-concept Android Trojan uses motion sensor to determine tapped keys

A team of researchers from Pennsylvania State University (PSU) and IBM have
designed a proof-of-concept Android Trojan app that can steal passwords and
other sensitive information by using the smartphone's motion sensors to
determine what keys victims tap on their touchscreens when unlocking their
phones or inputting credit card numbers during phone banking operations.
http://cwonline.computerworld.com/t/7968131/823929835/560539/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CALL FOR ENTRIES -- COMPUTERWORLD'S BUSINESS INTELLIGENCE BEST IN CLASS 2012

If your organization's BI project is innovative, has positively impacted your
business and has produced ROI, then we want to see your case study!

In our upcoming Aug. 27 issue, we will showcase a select group of the biggest
(and most fascinating) business decisions to which BI has contributed. Case
study submissions will be accepted now through April 27. Submit your nomination
here:

http://cwonline.computerworld.com/t/7968131/823929835/558910/0/

COMPUTERWORLD'S IT SALARY SURVEY 2012

A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.

http://cwonline.computerworld.com/t/7968131/823929835/558670/0/

SHARK TANK OF THE DAY
______________________

Looks like they took it back

IT pilot fish is in his company's parking lot when another employee approaches
him with the I-have-a-question walk, and this time it's about the Wi-Fi he's
getting -- or, rather, not getting -- at home.

http://cwonline.computerworld.com/t/7968131/823929835/560502/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

More than 600,000 Macs have been infected with a new version of the Flashback
Trojan horse that's being installed on people's computers with the help of Java
exploits. How does this infection affect Apple's reputation for security?

http://cwonline.computerworld.com/t/7968131/823929835/559457/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7968131/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7968131/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/7968131/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/7968131/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7968131/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz03OTY4MTMx&x=0a7a931b

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7968131/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7968131/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7968131/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive